Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Daily life requires us to have access to a lot of information, and  information systems help us access that information. Desktop computers,  laptops, and mobile devices keep us connected to the info

Daily life requires us to have access to a lot of information, and  information systems help us access that information. Desktop computers,  laptops, and mobile devices keep us connected to the information we need  through processes that work via hardware and software components.  Information systems infrastructure makes this possible. However, our  easy access to communication and information also creates security and  privacy risks. Laws, regulations, policies, and guidelines exist to  protect information and information owners. Cybersecurity ensures the  confidentiality, integrity, and availability of the information.  Identity management is a fundamental practice. Part of identity  management is the governance of access, authorization, and  authentication of users to information systems, Identity management is  one part of a layered security defense strategy within the information  systems infrastructure. Your work in this project will enable you to  produce a technical report and nontechnical presentation that addresses  these requirements.

There are five steps that will help you create your final deliverables. The deliverables for this project are as follows: 

  1. Nontechnical presentation: This is an 8-10 slide PowerPoint presentation for business executives and board members.
  2. Technical report: Your report should be a 6-7 page  double-spaced Word document with citations in APA format. The page count  does not include figures, diagrams, tables or citations.
  3. Executive summary: This should be a 2-3 page double-spaced Word document.
  4. In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.

When  you submit your project, your work will be evaluated using the  competencies listed below. You can use the list below to self-check your  work before submission.

  • 1.1: Organize document or  presentation clearly in a manner that promotes understanding and meets  the requirements of the assignment.
  • 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.
  • 6.2:  Creating a roadmap for organizations to use in development of an  Identity Access Management program (to address gaps in their current  offerings).
Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question